On Sep 2, 2020, at 2:18 PM, Jorge Vergara <jover...@microsoft.com> wrote: > After some more thought a concern came to me about reaching into TLS 1.3 and > using the HKDF. These dependencies on TLS versions are why all the EAP > methods are currently needing updates. Would using the HKDF directly create a > similar situation for the future? Would it be better to define these > calculation in terms of the TLS-Exporter instead?
I suspect so. https://docs.microsoft.com/en-us/openspecs/windows_protocols/MS-PEAP/0de54161-0bd3-424a-9b1a-854b4040a6df Says in part: In generating IPMK and CMK, 60 bytes are required. Therefore, LEN=60 in this case. PRF+(K, S, LEN) = T1 | T2 | ... |Tn Where: T1 = HMAC-SHA1 (K, S | 0x01 | 0x00 | 0x00) T2 = HMAC-SHA1 (K, T1 | S | 0x02 | 0x00 | 0x00) It looks like there's no particular need to use HMAC-SHA1 here. It's using HMAC-SHA1 as an "ad hoc" stream cipher, and isn't doing hashing (as such). I suggest then that we simply use the TLS-Exporter, as you suggest. Perhaps: IPMK = TLS-Exporter("EXPORTER: Inner Methods Compound Keys", ISK, 60) Which then mirrors the derivation used for TEAP. Alan DeKok. _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu